version 1.410, 2014/04/12 17:39:57 |
version 1.411, 2014/05/01 15:03:35 |
|
|
<li><a href="errata55.html#004_openssl">April 12, 2014: |
<li><a href="errata55.html#004_openssl">April 12, 2014: |
A use-after-free race condition in OpenSSL's read buffer may permit |
A use-after-free race condition in OpenSSL's read buffer may permit |
an attacker to inject data from one connection into another.</a> |
an attacker to inject data from one connection into another.</a> |
|
<li><a href="errata55.html#005_openssl">May 1, 2014: |
|
An attacker can trigger generation of an SSL alert which could |
|
cause a null pointer dereference.</a> |
</ul> |
</ul> |
|
|
<li><a name="54"></a> |
<li><a name="54"></a> |
|
|
<li><a href="errata54.html#008_openssl">April 12, 2014: |
<li><a href="errata54.html#008_openssl">April 12, 2014: |
A use-after-free race condition in OpenSSL's read buffer may permit |
A use-after-free race condition in OpenSSL's read buffer may permit |
an attacker to inject data from one connection into another.</a> |
an attacker to inject data from one connection into another.</a> |
|
<li><a href="errata54.html#009_openssl">May 1, 2014: |
|
An attacker can trigger generation of an SSL alert which could |
|
cause a null pointer dereference.</a> |
</ul> |
</ul> |
|
|
<li><a name="53"></a> |
<li><a name="53"></a> |